Join in this tactical discussion of how financial institutions are using new technologies to successfully prevent, identify and respond to security threats, no matter where they originate.
Learn how to identify, prevent and rapidly respond to user threats and data breaches
Find out how, while mitigating...
Just because you aren't directly offshoring any of your core systems or processes doesn't mean your third-party service provider isn't.
It's a given that most organization's outsource critical functions - particularly technology - as a means to reduce IT expense. Yet, even if organizations outsource these functions...
What are the most overlooked areas for physical security?
Ken Stasiak, president of Secure State, an Ohio-based information security firm that performs penetration testing, says physical security as a whole is overlooked.
"A handful of our clients say they don't need to test it because they know that their...
The insider threat - it may be the hardest to detect, yet it poses the greatest risk to information security and regulatory compliance. And with recent, high-profile data breaches resulting from insider abuses, the topic is hotter than ever.
Register for this webinar to learn:
How to identify and mitigate...
Forensics has become a hot topic for a variety of internal factors, including the importance of the Internet to everyday business and, with it, the rise of electronic fraud.
Externally, financial institutions especially feel regulatory heat in the form of FFIEC GLBA Notification Rule, SEC/NASD Rule 3010 and even he...
Federal regulations require many organizations to conduct independent testing of their computing and networking environment at regular intervals. Many organizations comply with this requirement by conducting penetration testing and vulnerability analyses. These tests offer a snapshot of an organization's security...
This webcast will describe ways banks can mature and simplify user provisioning and Identity Life-Cycle Management:
Integrated compliance support and the larger governance picture
Integrated identity administration and user provisioning across platforms, applications and user-groups
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
Understand why IT Audit is needed and what it will achieve
Gives attendees tools to use in preparing for IT Audit
Learn to identify, evaluate and improve IT Controls
Learn how to continuously collect and categorize information for year round availability
From GLBA to the ID Theft Red Flags Rule, information security awareness is a lynchpin of banking regulatory guidance. Register for this webinar to learn:
The fundamentals of an information security education program;
How to structure your program to satisfy the requirement and the need;
How to prepare and...
This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and Accurate Credit Transaction Act. In the course of this workshop, we will provide detailed "best practices"...
Examination of IT risk assessments and how they are vital to financial institutions
A look at why IT risk assessments are important to your organization
How an IT risk assessment is performed
Sample assessment matrix included
Board members and senior management are responsible for planning and implementing an IT risk management system that works. But they must understand the risks and safeguards - and in these challenging times they especially must know their legal accountability, as dictated by such regulations as the Gramm-Leach-Bliley...
If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.